渗透 发表于 2025-3-30 09:15:56

http://reply.papertrans.cn/15/1477/147601/147601_51.png

门闩 发表于 2025-3-30 14:26:33

http://reply.papertrans.cn/15/1477/147601/147601_52.png

BUMP 发表于 2025-3-30 18:03:18

Olga Garaschuk,Oliver Griesbeckidentity to another party ., but rather gives him information that would allow an authorized third party . to determine .‘s identity. However, . receives a guarantee that . can indeed determine .‘s identity. We consider a number of possible features of escrowed identity schemes, and describe a varie

手工艺品 发表于 2025-3-30 21:09:44

http://reply.papertrans.cn/15/1477/147601/147601_54.png

voluble 发表于 2025-3-31 01:19:34

https://doi.org/10.1007/978-94-017-9026-0near attack of full round DES. We describe an improved algorithm by combining the non-linear approximation method proposed by Knudsen and Robshaw, and the multiple approximation method proposed by Kaliski and Robshaw. This improvement can reduce the number of required plaintexts and ciphertexts pair

Altitude 发表于 2025-3-31 06:07:08

Jimmy Aramendiz,Alexander Fidlinof an unknown univariate polynomial of low degree . over the plaintext with a typically low but non-negligible, probability .. The method employed is essentially Sudan‘s algorithm for decoding Reed-Solomon codes beyond the error-correction diameter. The known-plaintext attack needs . = 2./.. plainte

Antioxidant 发表于 2025-3-31 09:36:22

http://reply.papertrans.cn/15/1477/147601/147601_57.png
页: 1 2 3 4 5 [6]
查看完整版本: Titlebook: Advances in Cryptology - CRYPTO ‘98; 18th Annual Internat Hugo Krawczyk Conference proceedings 1998 Springer-Verlag Berlin Heidelberg 1998